On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols.
Eyad Salah TaqieddinPublished in: Int. J. Commun. Networks Inf. Secur. (2017)
Keyphrases
- authentication protocol
- smart card
- rfid tags
- rfid systems
- security protocols
- cryptographic protocols
- radio frequency identification
- hash functions
- security analysis
- low cost
- rfid technology
- lightweight
- cost effective
- public key
- information security
- key distribution
- secure communication
- resource constrained
- encryption scheme
- digital signature
- secret key
- security mechanisms
- security properties
- security requirements
- ban logic
- supply chain
- security issues